You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the frontiers of cyberspace to Tibetans in exile, from computer bulletin boards to faxes, film, and videotape, the ongoing and often startling evolution of media continues to generate fresh new avenues for cultural criticism, political activism, and self-reflection. How is contemporary life affected by this stunning proliferation of information technologies? How does the Internet influence, and perhaps alter, users' experience of community and their sense of self? In what way are giant media conglomerates implicated in these far-reaching developments? Connected, the third volume in the groundbreaking and highly acclaimed Late Editions series, confronts these provocative questions through unique experiments with the interview format. It explores both the new pathways being forged through media and the predicaments of those struggling to find their way in the twilight of the twentieth century.
None
Austin, Texas, entered the aviation age on October 29, 1911, when Calbraith Perry Rodgers landed his Wright EX Flyer in a vacant field near the present-day intersection of Duval and 45th Streets. Some 3,000 excited people rushed out to see the pilot and his plane, much like the hundreds of thousands who mobbed Charles A. Lindbergh and The Spirit of St. Louis in Paris sixteen years later. Though no one that day in Austin could foresee all the changes that would result from manned flight, people here—as in cities and towns across the United States—realized that a new era was opening, and they greeted it with all-out enthusiasm. This popularly written history tells the story of aviation in ...
This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.
Internet searchers reveal how they get the best out of the Internet with tips, techniques and case histories
None
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.
None
An authoritative and accessible guide to establishing and maintaining an electronic mail system using this powerful but very difficult software program. Highly regarded by the Sendmail community, this book is the only dedicated tutorial on the topic.